Differential Privacy
From Theory to Practice
519 kr
Beställningsvara. Skickas inom 5-8 vardagar. Fri frakt för medlemmar vid köp för minst 249 kr.
Produktinformation
- Utgivningsdatum2016-10-26
- Mått191 x 235 x 11 mm
- Vikt272 g
- FormatHäftad
- SpråkEngelska
- SerieSynthesis Lectures on Information Security, Privacy, and Trust
- Antal sidor124
- FörlagSpringer International Publishing AG
- ISBN9783031012228
- OriginaltitelDifferential Privacy
Tillhör följande kategorier
Ninghui Li is a professor of computer science at Purdue University. His research interests are in security and privacy. He received a Bachelor's degree from the University of Science and Technology of China in 1993 and a Ph.D. in computer science from New York University in 2000. Before joining the faculty of Purdue in 2003, he was a research associate at Stanford University's Computer Science Department for three years. Prof. Li is Vice Chair of ACM Special Interest Group on Security, Audit and Control (SIGSAC). He is serving, or has served, on the editorial boards of ACM Transactions on Privacy and Security (TOPS), Journal of Computer Security (JCS), IEEE Transactions on Dependable and Secure Computing, VLDB Journal, and ACM Transactions on Internet Technology. He has served on the Program Committees of many international conferences and workshops in computer security, databases, and data mining, including serving as Program Chair for 2014 and 2015 ACM Conference on Computer and Communications Security (CCS), ACM's flagship conference in the field of security and privacy.Min Lyu has been a lecturer in the School of Computer Science and Technology at the University of Science and Technology of China since 2007. She received a Bachelor's degree and a Master's degree in applied mathematics from Anhui University in 1999 and 2002, respectively, and a Ph.D. in applied mathematics from the University of Science and Technology of China in 2005. Before joining the faculty of the University of Science and Technology of China in 2007, she was a post-doctor in School of Computer Science and Technology at the University of Science and Technology of China for two years. She was a visiting scholar at Purdue University in 2015, hosted by Professor Ninghui Li on the topic of differential privacy. Her research interests are in security and privacy, social networks, and combinatorial mathematics.Dong Su is a Ph.D. student in the Computer Science Department at PurdueUniversity. He received a Bachelor's degree in software engineering from Tianjin University in 2005 and a Master's degree in computer science from the University of Chinese Academy of Sciences in 2010. He entered Purdue University in the Fall of 2010, and is working under the supervision of Dr. Ninghui Li on the topic of differentially private data publishing for data analysis. His research interests are in data privacy, information security, machine learning, and database management systems.Weining Yang is a Ph.D. student in the Department of Computer Science at Purdue University. He attended Tsinghua University and graduated with a Bachelor's degree in computer science in 2011. He entered Purdue University in the Fall of 2011, and worked under the supervision of Dr. Ninghui Li on the topic of differentially private data publishing and password-based authentication. His research interests are in security and privacy, in particular private data publishing and user authentication.
- Acknowledgments.- Introduction.- A Primer on ?-Differential Privacy.- What Does DP Mean?.- Publishing Histograms for Low-dimensional Datasets.- Differentially Private Optimization.- Publishing Marginals.- The Sparse Vector Technique.- Bibliography.- Authors' Biographies.
Mer från samma författare
Analysis Techniques for Information Security
Anupam Datta, Somesh Jha, Ninghui Li, David Melski, Thomas Reps
479 kr
Mer från samma serie
Analysis Techniques for Information Security
Anupam Datta, Somesh Jha, Ninghui Li, David Melski, Thomas Reps
479 kr
Enhancing Information Security and Privacy by Combining Biometrics with Cryptography
Sanjay Kanade, Dijana Petrovska-Delacretaz, Bernadette Dorizzi
479 kr
Hardware Malware
Edgar Weippl, Christian Krieg, Adrian Dabrowski, Katharina Krombholz, Heidelinde Hobel
469 kr
Security and Trust in Online Social Networks
Barbara Carminati, Elena Ferrari, Marco Viviani
479 kr
Mobile Platform Security
N. Asokan, Lucas Davi, Alexandra Dmitrienko, Stephan Heuser, Kari Kostiainen, Elena Reshetova, Ahmad-Reza Sadeghi
479 kr
Du kanske också är intresserad av
Analysis Techniques for Information Security
Anupam Datta, Somesh Jha, Ninghui Li, David Melski, Thomas Reps
479 kr
Anomaly Detection as a Service
Danfeng (Daphne) Yao, Xiaokui Shu, Long Cheng, Salvatore J. Stolfo, Yao
789 kr
Security and Trust in Online Social Networks
Barbara Carminati, Elena Ferrari, Marco Viviani
479 kr
Journey into Security Certification
Marco Anisetti, Claudio Agostino Ardagna, Ernesto Damiani, Nabil El Ioini
389 kr
Automated Software Diversity
Per Larsen, Stefan Brunthaler, Lucas Davi, Ahmad-Reza Sadeghi, Michael Franz
409 kr
Machine Learning Techniques for Cybersecurity
Elisa Bertino, Sonam Bhardwaj, Fabrizio Cicala, Sishuai Gong, Imtiaz Karim, Charalampos Katsis, Hyunwoo Lee, Adrian Shuai Li, Ashraf Y. Mahgoub
569 kr